Lab: User role controlled by request parameter
This lab has an admin panel at
/admin, which identifies administrators using a forgeable cookie.
Solve the lab by accessing the admin panel and using it to delete the user
You have an account on the application that you can use to help design your attack. The credentials are:
/admin and observe that you can't access the admin panel.
Browse to the login page.
In Burp Proxy, turn interception on and enable response interception.
Complete and submit the login page, and forward the resulting request in Burp.
Observe that the response sets the cookie
Admin=false. Change it to
Load the admin panel and delete